Attacking the smart grid using public information

Charalambos Konstantinou, Marios Sazos, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Over the past years, sophisticated adversaries have infiltrated the control networks of energy companies around the globe. As attempts to compromise industrial control and information technology systems have soared, electric utilities increase their investments in cyber security as an important step to enhance resiliency of the power system. Although utility companies started adopting a defense in depth strategy, compliant with security reliability standards, the first step towards building effective mitigation strategies is to understand the attack vectors emerging from publicly available information. To this end, we utilize data from accessible resources to create a map of the topological and electrical structure of smart grid regions. Furthermore, we identify electronic devices able to control the critical electrical units in the system. The location and characteristics of these components are used in a simulation environment to study the interaction of controls and dynamics in the system. Lastly, we examine the paths of attacking control equipment and discuss the impact of such scenarios.

Original languageEnglish (US)
Title of host publicationLATS 2016 - 17th IEEE Latin-American Test Symposium
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781509013319
StatePublished - Jun 1 2016
Event17th IEEE Latin-American Test Symposium, LATS 2016 - Foz do Iguacu, Brazil
Duration: Apr 6 2016Apr 9 2016

Publication series

NameLATS 2016 - 17th IEEE Latin-American Test Symposium


Other17th IEEE Latin-American Test Symposium, LATS 2016
CityFoz do Iguacu

ASJC Scopus subject areas

  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality
  • Electrical and Electronic Engineering


Dive into the research topics of 'Attacking the smart grid using public information'. Together they form a unique fingerprint.

Cite this